<--- Back to Details
First PageDocument Content
Spamming / Botnets / Concurrent computing / File sharing networks / Peer-to-peer / Storm botnet / Storm Worm / Connectivity / Topology / Multi-agent systems / Computing / Computer network security
Date: 2010-12-06 13:54:48
Spamming
Botnets
Concurrent computing
File sharing networks
Peer-to-peer
Storm botnet
Storm Worm
Connectivity
Topology
Multi-agent systems
Computing
Computer network security

2010 ACSAC Proceedings - Papers

Add to Reading List

Source URL: www.cs.stevens.edu

Download Document from Source Website

File Size: 307,95 KB

Share Document on Facebook

Similar Documents

Algebra / Abstract algebra / Topology / Algebraic geometry / Complex manifolds / Vector bundles / Sheaf theory / Algebraic topology / Projective variety / Coherent sheaf / Sheaf / Cohomology

Geometry & Topology–Topological properties of Hilbert schemes of almost-complex four-manifolds II

DocID: 1xVL5 - View Document

Category theory / Mathematics / Algebra / Functors / Homological algebra / Algebraic topology / Additive categories / Natural transformation / Exact functor / Yoneda lemma / Equivalence of categories / Sheaf

Algebraic & Geometric Topology–Generic representations of orthogonal groups: the mixed functors

DocID: 1xVsM - View Document

Mathematics / Algebra / Abstract algebra / Differential geometry / Symmetry / Algebraic structures / Category theory / Homotopy theory / Groupoid / Lie algebroid / Lie groupoid / Group action

Geometry & Topology–K –duality for stratified pseudomanifolds C LAIRE D EBORD

DocID: 1xVky - View Document

Internet architecture / Computing / Network architecture / Routing / Information and communications technology / Computer networking / Internet protocols / Traceroute / Hop / Network topology / Forwarding plane / Computer network

NetHide: Secure and Practical Network Topology Obfuscation Roland Meier∗ , Petar Tsankov∗ , Vincent Lenders , Laurent Vanbever∗ , Martin Vechev∗ ∗ ETH Zürich

DocID: 1xVcN - View Document

Internet architecture / Computing / Network architecture / Routing / Information and communications technology / Computer networking / Internet protocols / Traceroute / Hop / Network topology / Forwarding plane / Computer network

NetHide: Secure and Practical Network Topology Obfuscation Roland Meier∗ , Petar Tsankov∗ , Vincent Lenders , Laurent Vanbever∗ , Martin Vechev∗ ∗ ETH Zürich

DocID: 1xV3c - View Document